{"affected":[{"ecosystem_specific":{"binaries":[{"go1.16":"1.16.14-1.43.1","go1.16-doc":"1.16.14-1.43.1","go1.16-race":"1.16.14-1.43.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.3","name":"go1.16","purl":"pkg:rpm/opensuse/go1.16&distro=openSUSE%20Leap%2015.3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.16.14-1.43.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for go1.16 fixes the following issues:\n\n- CVE-2022-23806: Fixed incorrect returned value in crypto/elliptic IsOnCurve (bsc#1195838).\n- CVE-2022-23772: Fixed overflow in Rat.SetString in math/big can lead to uncontrolled memory consumption (bsc#1195835).\n- CVE-2022-23773: Fixed incorrect access control in cmd/go (bsc#1195834).\n\nThe following non-security bugs were fixed:\n\n- go#50977 crypto/elliptic: IsOnCurve returns true for invalid field elements\n- go#50700 math/big: Rat.SetString may consume large amount of RAM and crash\n- go#50686 cmd/go: do not treat branches with semantic-version names as releases\n- go#50866 cmd/compile: incorrect use of CMN on arm64\n- go#50832 runtime/race: NoRaceMutexPureHappensBefore failures\n- go#50811 cmd/go: remove bitbucket VCS probing\n- go#50780 runtime: incorrect frame information in traceback traversal may hang the process.\n- go#50721 debug/pe: reading debug_info section of PE files that use the DWARF5 form DW_FORM_line_strp causes error\n- go#50682 cmd/compile: MOVWreg missing sign-extension following a Copy from a floating-point LoadReg\n- go#50645 testing: surprising interaction of subtests with TempDir\n- go#50585 net/http/httptest: add fipsonly compliant certificate in for NewTLSServer(), for dev.boringcrypto branch\n- go#50245 runtime: intermittent os/exec.Command.Start() Hang on Darwin in Presence of 'plugin' Package\n","id":"openSUSE-SU-2022:0724-1","modified":"2022-03-04T09:34:13Z","published":"2022-03-04T09:34:13Z","references":[{"type":"ADVISORY","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IMRYQV73OUYCKMEO4GSE5KGQ7EEQYJHV/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1182345"},{"type":"REPORT","url":"https://bugzilla.suse.com/1195834"},{"type":"REPORT","url":"https://bugzilla.suse.com/1195835"},{"type":"REPORT","url":"https://bugzilla.suse.com/1195838"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-23772"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-23773"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-23806"}],"related":["CVE-2022-23772","CVE-2022-23773","CVE-2022-23806"],"summary":"Security update for go1.16","upstream":["CVE-2022-23772","CVE-2022-23773","CVE-2022-23806"]}